Este contenido no está disponible en el idioma seleccionado.
5.2. Using Identity Management for Authentication
		Satellite 5 now offers authentication through an IdM or IPA server, which provides support for:
	
- Kerberos authentication in the WebUI
- Users do not need to be pre-created in Satellite database
- The PAM authentication can be enabled for all users
- User roles can be derived from user group membership in the external identity provider
- System Groups administrators can be derived from user group membership in the external identity provider per Organization
Note
			IPA authentication configuration only works with Satellite 5's Web UI. Client tools like 
rhn_register, rhnreg_ks, spacecmd, rhncfg-manager and the Satellite 5 API can not use IPA authentication.
		5.2.1. Requirements
Copiar enlaceEnlace copiado en el portapapeles!
			Satellite Authentication through IPA has the following requirements:
		
- A configured Satellite Server. The following instructions will use the hostnamesatellite.example.comto denote the Satellite server.
- A configured IPA/IdM Server on Red Hat Enterprise Linux 6 or 7. The following instructions will use the hostnameipa.example.comto denote the IPA server.
- Installation of additional packages on the Satellite server. Use the following command to install these packages from the standard Red Hat Enterprise Linux 6 and 7 repositories:yum install ipa-client ipa-admintools sssd sssd-dbus mod_auth_kerb mod_authnz_pam mod_lookup_identity mod_intercept_form_submit -y [root@satellite ~]# yum install ipa-client ipa-admintools sssd sssd-dbus mod_auth_kerb mod_authnz_pam mod_lookup_identity mod_intercept_form_submit -yCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
- The latest version of theselinux-policypackage to ensure the latest SELinux Booleans are added. You can update this package with the following command:yum update selinux-policy -y [root@satellite ~]# yum update selinux-policy -yCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
5.2.2. Enrolling the Satellite Server
Copiar enlaceEnlace copiado en el portapapeles!
			Enrol the Satellite server with the IPA server using the 
ipa-client-install command. This will step through the required configuration options to enrol the Satellite server.
		
			When complete, the Satellite server acts as an client using the IPA Server details.
		
			The IPA server also requires a HTTP Service for the Satellite server. Authenticate the Satellite server against the IPA server with the admin user and run the 
ipa service-add command:
		5.2.3. Using the IPA Authentication Setup Tool
Copiar enlaceEnlace copiado en el portapapeles!
			Satellite contains a tool called 
spacewalk-setup-ipa-authentication, which configures your Satellite server to use IPA Authentication. The tool performs the following steps:
		- Configures Kerberos authentication on the Satellite server
- Configures SSSD services on the Satellite server
- Configures Satellite webservers to communicate with SSSD and observe PAM authentication
			Run the command on the Satellite server to start the configuration:
		
spacewalk-setup-ipa-authentication
[root@satellite ~]# spacewalk-setup-ipa-authentication
5.2.4. Finalizing Authentication Configuration
Copiar enlaceEnlace copiado en el portapapeles!
			Log in as the Satellite administration user and navigate to  
			Users can now login to Satellite using their IPA credentials.
		
5.2.5. Configuring IPA to Use Multiple Organizations (Optional)
Copiar enlaceEnlace copiado en el portapapeles!
			The IPA server contains a parameter for the Organizational Unit for each user. Satellite can use this value to map to its own Organizations. This adds specific users to Organizations based upon the Organizational Unit value (
ou) in the IPA server.
		
			Log in as the Satellite administration user and navigate to  
			Satellite now adds users to Organizations based on each user's Organizational Unit in the IPA server. Users with no Organizational Unit are assigned to the default organization.
		
5.2.6. Configuring IPA to Use Groups (Optional)
Copiar enlaceEnlace copiado en el portapapeles!
			The IPA server contains parameters for Groups, which Satellite can map to roles. This provides a method to use role-based permissions for IPA users.
		
			Log in as the Satellite administration user and navigate to  
- External Group Name - Enter the name of the group from the IPA server.
- Administrative Roles and Roles - Select roles to assign to the group. For example, assign the Channel Administrator.
			Click Create to complete the group creation.
		
			Satellite now assigns permissions to users based on each user's IPA groups.